We use Docker Official Images as the base images for several of our services. It's a popular choice, and there are good reasons for this. A dedicated

Keeping up with Docker Official Images

submited by
Style Pass
2021-06-08 16:00:06

We use Docker Official Images as the base images for several of our services. It's a popular choice, and there are good reasons for this. A dedicated team reviews them at Docker and gets actively maintained by experts from their respective communities, including the security community.

When we first started building these images, we struggled to integrate the process used to release fixes to the community. I can summarize our problems into two high-level buckets:

It wasn't that patches weren't flowing in. The maintainers were doing a great job. It turned out that we needed a better approach for managing our Dockerfiles. We needed a Docker policy that could take advantage of the security and bug fixes that were reliably streaming in. And that was something we were missing entirely.

To ground this discussion in something real, we'll use the official openjdk image as an ex. The lessons are applicable to any of the image repositories (debian, node, nginx, or redis for example).

Leave a Comment